Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

'KeyRaider' iOS malware targets jailbroken devices

Credentials for more than 225,000 Apple accounts have been stolen by sophisticated malware that targets modified iOS devices, according to Palo Alto Networks.

Russian-speaking hackers breach 97 websites, many of them dating ones

Russian-speaking hackers have breached 97 websites, mostly dating-related, and stolen login credentials, putting hundreds of thousands of users at risk.


lizard

6 UK teenagers arrested for allegedly using Lizard Squad's Lizard Stresser DDoS service

UK law enforcement arrested six teenagers accused of using the Lizard Stressor DDoS service to launch attacks on Microsoft, Amazon, Sony and other corporate websites.

Microsoft may offer some Windows 10 patch notes to enterprises

Windows 10 Enterprise has been installed in about 1.5 million business devices in less than a month. Now Microsoft is considering how to best offer patch information to users of its new OS.

Padlock

US agency to seek consensus on divisive, volatile topic of security vulnerability disclosures

The U.S. National Telecommunications and Information Administration will host a series of discussions about the best way to disclose cybersecurity vulnerabilities.

electric meter meter electricity power residential costs 000000662277

Anatomy of an IoT hack

A lecture by an Internet security company runs through the chilling, hypothetical shut-down of the electrical grid via a domestic, Wi-Fi-connected oven.

linux penguins arguing

Grsecurity will stop issuing patches citing trademark abuse

A major corporation is misusing grsecurity’s trademarks and violating the terms of the GNU Public License – and as a consequence, the leader of the project said Wednesday, grsecurity will stop making its stable patches available to...

privacycon logo final nodrone

Attention whitehats, The FTC wants you to lead new privacy, security push

The FTC’s PrivacyCon will include brief privacy and security research presentations, along with expert panel discussions on the latest privacy and security challenges facing consumers. Whitehat researchers and academics will discuss...

wifi blocking 2

Wi-Fi blocking debate far from over

Following the FCC’s warning in January that it would no longer tolerate the Marriotts of the world blocking visitors’ WiFi hotspots, I set a reminder on my calendar to revisit the topic six months later. After all, the issue of WiFi...

A new version of the sophisticated Duqu malware is used for spying

Researchers find many more modules of Regin spying tool

Security researchers from Symantec have identified 49 more modules of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency and its close allies.

making the case security

Law firm makes a case for security certification

A big law firm handling sensitive documents uses its ISO security certification as a competitive differentiator
.

Google to freeze some Adobe Flash content on Sept. 1

Google will stop some Flash content from automatically playing starting Sept. 1, a move it decided on earlier this year to improve browser performance.

Vidder's Software Defined Perimeter puts tight security around high value assets

Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.

alias1

The ultimate auto-pilot software gets $15M boost

DARPA says the Aircrew Labor In-Cockpit Automation System or ALIAS program, which was announced in 2014 envisions a tailorable, drop-in, removable software kit that allows the addition of high levels of automation into existing...

Security in cloud computing

BitTorrent patches flaw that could amplify distributed denial-of-service attacks

BitTorrent fixed a vulnerability that would have allowed attackers to hijack BitTorrent applications used by hundreds of millions of users in order to amplify distributed denial-of-service (DDoS) attacks.

Researchers find holes in routers supplied by ISPs

Some routers vulnerable to remote hacking due to hard-coded admin credentials

Several DSL routers from different manufacturers contain a guessable hard-coded password that allows accessing the devices with a hidden administrator account.

healthcare it security jobs

More than 80% of healthcare IT leaders say their systems have been compromised

A survey of IT leaders in healthcare revealed that 81% of them believe their systems have been compromised by at least one malware, botnet or some other cyber-attack in the past two years, placing patient sensitive data at risk.

Internet of Things hack security smart home

Smart refrigerator hack exposes Gmail login credentials

A Samsung smart refrigerator designed to integrate Gmail Calendar information has a vulnerability that could allow hackers to steal Gmail user names and passwords.

Fraud gang targeted large European companies

Tor security concerns prompt largest dark market to suspend operations

Administrators of Agora, the largest online black marketplace operating on the Tor anonymity network, decided to temporarily suspend the website because of possible attacks based on recent methods of exposing Tor Hidden Services.

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

Load More